9.3

CVSS4.0

CVE-2025-2080 -

Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service that could allow an attacker to bypass authentication measures and gain controls over utilities within the products.

πŸ“… Published: March 13, 2025, 4:57 p.m. πŸ”„ Last Modified: March 13, 2025, 6:46 p.m.

8.7

CVSS4.0

CVE-2025-2079 -

Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain a hard coded secret key. This could allow an attacker to generate valid JWT (JSON Web Token) sessions.

πŸ“… Published: March 13, 2025, 4:55 p.m. πŸ”„ Last Modified: March 13, 2025, 6:49 p.m.

8.6

CVSS4.0

CVE-2025-27107 - Integrated Scripting vulnerable to arbitrary code execution via Java reflection

Integrated Scripting is a tool for creating scripts for handling complex operations in Integrated Dynamics. Minecraft users who use Integrated Scripting prior to versions 1.21.1-1.0.17, 1.21.4-1.0.9-254, 1.20.1-1.0.13, and 1.19.2-1.0.10 may be vulnerable to arbitrary code execution. By using Java r…

πŸ“… Published: March 13, 2025, 4:55 p.m. πŸ”„ Last Modified: March 13, 2025, 6:52 p.m.

7.8

CVSS3.1

CVE-2025-1652 - MODEL File Parsing Out-of-Bounds Read Vulnerability

A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

πŸ“… Published: March 13, 2025, 4:51 p.m. πŸ”„ Last Modified: March 13, 2025, 6:53 p.m.

7.8

CVSS3.1

CVE-2025-1651 - MODEL File Parsing Heap-Based Buffer Overflow Vulnerability

A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

πŸ“… Published: March 13, 2025, 4:51 p.m. πŸ”„ Last Modified: March 13, 2025, 6:54 p.m.

7.8

CVSS3.1

CVE-2025-1650 - CATPRODUCT File Parsing Uninitialized Variable Vulnerability

A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

πŸ“… Published: March 13, 2025, 4:51 p.m. πŸ”„ Last Modified: March 13, 2025, 7:35 p.m.

7.8

CVSS3.1

CVE-2025-1649 - CATPRODUCT File Parsing Uninitialized Variable Vulnerability

A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

πŸ“… Published: March 13, 2025, 4:51 p.m. πŸ”„ Last Modified: March 13, 2025, 7:35 p.m.

7.8

CVSS3.1

CVE-2025-1433 - MODEL File Parsing Out-of-Bounds Read Vulnerability

A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

πŸ“… Published: March 13, 2025, 4:51 p.m. πŸ”„ Last Modified: March 13, 2025, 7:36 p.m.

7.7

CVSS4.0

CVE-2025-27138 - DataEase has an improper authentication vulnerability

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.6, there is a flaw in the authentication in the io.dataease.auth.filter.TokenFilter class, which may cause the risk of unauthorized access. The vulnerability has been fixed in v2.10.6. No known worka…

πŸ“… Published: March 13, 2025, 4:49 p.m. πŸ”„ Last Modified: March 13, 2025, 7:48 p.m.

7.8

CVSS3.1

CVE-2025-1432 - 3DM File Parsing Use-After-Free Vulnerability

A maliciously crafted 3DM file, when parsed through Autodesk AutoCAD, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

πŸ“… Published: March 13, 2025, 4:49 p.m. πŸ”„ Last Modified: March 13, 2025, 7:51 p.m.
Total resulsts: 285245
Page 5 of 28,525
Β« previous page Β» next page
Filters